9 Identity Management Articles for Cybersecurity Professionals

Share on linkedin
Share on twitter
Share on facebook

IAM, APTs, and Self-Sovereign Identity headline this week’s digest of  Identity Management articles for Cybersecurity Professionals.

9 Identity Management Articles for Cybersecurity Professionals

Thanks for checking out this week’s digest of articles for Cybersecurity Professionals. Click here to view the healthcare-focused digest.

Peruse our resources for webinarscase studies, infographics, and educational videosSubscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM digest, delivered Tuesdays at 8 PM ET.

9 Identity Management Articles for Cybersecurity Professionals

 

6 Reasons You Should Get Started with an Identity Management Roadmap via Idenhaus

An Identity Management Roadmap engagement assesses the current state of your IAM program, identifies challenges, and develops a clear plan to implement.

 

Industrial Cybersecurity Concerns Heat Up in The Era of COVID-19 via AutomationWorld

As industrial companies connect plant-level software and devices to internet-connected enterprise systems, cybersecurity has become a critical operations issue for manufacturers of all sizes.

 

How to Modernize Legacy and Next Gen Cloud Identity and Access Management via IntegrationDeveloperNews

With more organizations deploying a cloud-first strategy, it’s critical that businesses have an efficient and secure cloud-based way to administer, authenticate, analyze, govern, and manage identities.

 

Are Cloud-Native IAM Controls Good Enough for Your Enterprise? via Security Intelligence

IT and IAM teams must go beyond native controls and think about the IAM governance program from a broader, programmatic perspective. You should leverage these native controls according to a unified corporate governance policy that includes a predefined access model.

 

FBI: APTs Actively Exploiting Fortinet VPN Security Holes via ThreatPost

Three security vulnerabilities in the Fortinet SSL VPN are being used to gain a foothold within networks before moving laterally and carrying out recon.

 

Credential Management for IoT Devices: Rethinking Access Control and Authentication via Business2Community

Companies need to develop strong authentication communication protocols that provide integrity and confidentiality protection. Otherwise, hackers can modify the messages that are in transit or steal critical data by eavesdropping.

 

533 million Facebook users’ phone numbers and personal data have been leaked online via IGN

The personal data and phone numbers of over 533 million Facebook users were leaked on a low level hacking forum on Saturday, April 3.

 

Linux Foundation Announces DizmeID Foundation to Develop and Enable a Self-Sovereign Identity Credential Network via Yahoo

The Linux Foundation, the nonprofit organization enabling mass innovation through open source, today announced the DizmeID Foundation and technical project with the intent to support digital identity credentialing.

 

Mastering Identity Management: When Your HRIS System Falls Short via Idenhaus

Building an IAM solution for the first time often reveals issues with HRIS data and user management processes that can stall your IAM implementation. The question is: can we define a common approach to improve the quality of HRIS data so that our IAM solution succeeds?

 

Check out our previous digest of articles for Cybersecurity Professionals, 10 Data Privacy and Cybersecurity Articles, March 2021.

 

To receive the top Identity Management articles for Cybersecurity Professionals in your inbox every two weeks (Tuesdays 8 PM EST), subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM Digest.

 

Follow @Idenhaus on Twitter and subscribe to our YouTube channel

 



By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us

Share on twitter
Share on linkedin
Share on facebook
Share on pocket
Share on email

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top